Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 17 submissions in the queue.
posted by martyb on Friday May 11 2018, @01:17AM   Printer-friendly
from the improved-security-plus-continued-impressive-uptime dept.

Softpedia reports

The patch addresses a total of nine security vulnerabilities

[...] All these flaws could [allow] local attackers to either crash the system or execute arbitrary code, bypass intended access restrictions to the connection tracking helpers list, as well as to inappropriately modify the system-wide operating system fingerprint list. Canonical urges all Ubuntu 16.04 LTS and Ubuntu 14.04 LTS users using the Canonical Livepatch to update their system immediately. A restart is not required when updating the kernel [using the] live patch.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1, Interesting) by Anonymous Coward on Friday May 11 2018, @02:43AM

    by Anonymous Coward on Friday May 11 2018, @02:43AM (#678248)

    Plus live patching doesn't completely negate the need to reboot. After a live patch, every call has added overhead to determine whether it is patched or not, which increases per live patch installed. Also, depending on the work it does, it can murder performance, cause instability, and increase attack surface area for escalation attacks. Only with a reboot do you get the fresh kernel.

    Starting Score:    0  points
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  

    Total Score:   1